Author of the publication

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.

, , , , and . ICISSP, page 146-156. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Automatic Text Classification Method Based on BERT and Feature Union., , , , , and . ICPADS, page 774-777. IEEE, (2019)An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing., , , and . ICCAI, page 323-328. ACM, (2023)Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 458-466. Springer, (2015)Optimization of Antenna Design Using the Artificial Neural Network and the Simulated Annealing Algorithm., , , , and . ComComAP, page 119-122. IEEE, (2021)Machine Learning for Variance Reduction in Online Experiments., , , , , and . NeurIPS, page 8637-8648. (2021)Reveal the Mathematical Structures of Honeyword Security Metrics., , , and . CoRR, (2023)Word-Graph2vec: An efficient word embedding approach on word co-occurrence graph using random walk sampling., , , and . CoRR, (2023)Phase-matching quantum key distribution based on heralded pair-coherent source., , , , , and . Quantum Inf. Process., 22 (1): 37 (2023)Parameter analysis of chirplet transform and high-resolution time-frequency representation via chirplets combination., , , , and . Signal Process., (2023)Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things., , and . Cyber Security, page 1-8. IEEE, (2019)